Technology 2 min read

Google Uses Asylo System to Boost Cloud Cybersecurity

In conjunction with Safer Internet Week, Google just announced their intentions to use their Asylo platform to make their cloud computing systems safer than ever.

Google wants to make cloud computing safer than ever. | Pixabay

Google wants to make cloud computing safer than ever. | Pixabay

In an effort to encourage the public to use more cloud storage, Google wants to double down on its confidential computing approach. Using Asylo, the company’s open-source framework, Google aims to take cloud cybersecurity to the next level.

In an announcement yesterday in conjunction with Safer Internet Week, Google claimed it wants to deliver higher levels of control through confidential computing. Through the Asylo framework project, Google hopes to ensure that the secure enclave features of processors are much easier to use

“Confidential computing aims to create computing environments that can help protect applications and data while they are in use—even from privileged access, including from the cloud provider itself,” Google said.

“The most common approach for implementing key parts of confidential computing is using trusted execution environments (TEEs) to build software enclaves.”

Read More: United Kingdom Named As The Safest Country For Internet Users

Advancing Confidential Computing

According to Google, confidential computing through Asylo will help protect the information of customers from different security issues like:

  • malicious insiders
  • network vulnerabilities
  • compromised host OS
  • BIOS compromise

“Asylo is designed to be agnostic to the hardware platform it rests on (and its trusted execution environment),” the company further said.

“This key design point is meant to make software development easier, reducing the friction developers experience when building software to run in a confidential computing environment.”

However, despite Asylo’s mission to address the technical challenges of developing trusted applications, Google admits that a better understanding of security risk tradeoffs and performance implications will only come from a broad usage of confidential computing across the spectrum.

“The best way to develop these design patterns is for people to begin experimenting with confidential computing,” Google went on to say.

Read More: Star Wars-Inspired Google Implements Use Of Physical Security Keys

Found this article interesting?

Let Rechelle Ann Fuertes know how much you appreciate this article by clicking the heart icon and by sharing this article on social media.


Profile Image

Rechelle Ann Fuertes

Rechelle is an SEO content producer, technical writer, researcher, social media manager, and visual artist. She enjoys traveling and spending time anywhere near the sea with family and friends.

Comments (0)
Most Recent most recent
You
57
share Scroll to top

Link Copied Successfully

Sign in

Sign in to access your personalized homepage, follow authors and topics you love, and clap for stories that matter to you.

Sign in with Google Sign in with Facebook

By using our site you agree to our privacy policy.